4,678 research outputs found

    Portable Common Execution Environment (PCEE) project review: Peer review

    Get PDF
    The purpose of the review was to conduct an independent, in-depth analysis of the PCEE project and to provide the results of said review. The review team was tasked with evaluating the potential contribution of the PCEE project to the improvement of the life cycle support of mission and safety critical (MASC) computing components for large, complex, non-stop, distributed systems similar to those planned for such NASA programs as the space station, lunar outpost, and manned missions to Mars. Some conclusions of the review team are as follow: The PCEE project was given high marks for its breath of vision on the overall problem with MASC software; Correlated with the sweeping vision, the Review Team is very skeptical that any research project can successfully attack such a broad range of problems; and several recommendations are made such as to identify the components of the broad solution envisioned, prioritizing them with respect to their impact and the likely ability of the PCEE or others to attack them successfully, and to rewrite its Concept Document differentiating the problem description, objectives, approach, and results so that the project vision becomes assessible to others

    ModuLand plug-in for Cytoscape: determination of hierarchical layers of overlapping network modules and community centrality

    Get PDF
    Summary: The ModuLand plug-in provides Cytoscape users an algorithm for determining extensively overlapping network modules. Moreover, it identifies several hierarchical layers of modules, where meta-nodes of the higher hierarchical layer represent modules of the lower layer. The tool assigns module cores, which predict the function of the whole module, and determines key nodes bridging two or multiple modules. The plug-in has a detailed JAVA-based graphical interface with various colouring options. The ModuLand tool can run on Windows, Linux, or Mac OS. We demonstrate its use on protein structure and metabolic networks. Availability: The plug-in and its user guide can be downloaded freely from: http://www.linkgroup.hu/modules.php. Contact: [email protected] Supplementary information: Supplementary information is available at Bioinformatics online.Comment: 39 pages, 1 figure and a Supplement with 9 figures and 10 table

    NYS PROMISE Learning Community Group Concept Mapping: Fall 2016 Case Manager Experience - Final Report

    Get PDF
    Beginning in 2014, the Federal Government provided funding to New York State as part of an initiative to improve services that lead to sustainable outcomes for youth receiving Supplemental Security Income (SSI) benefits. As part of the NYS PROMISE initiative, Concept Systems, Inc. worked with the Learning Community to develop learning needs frameworks using the Group Concept Mapping methodology (GCM). The GCM projects gather, aggregates, and integrate the specific knowledge and opinions of the Learning Community members. This allows for their guidance and involvement in supporting NYS PROMISE as a viable community of practice. This work also increases the responsiveness of NYS PROMISE to the Learning Community members’ needs by inspiring discussion during the semi-annual in-person meetings. As of the end of year three, three GCM projects have been completed with the PROMISE Learning Community. These projects focused on Outreach and Recruitment Project 1), Case Management and Service Delivery (Project 2), and Case Manager Experience (Project 3). This report discusses the data collection method and participation in the Case Manager Experience GCM project, as well as providing graphics, statistical reports, and a summary of the analysis

    Using Replication and Partitioning to Build Secure Distributed Systems

    Get PDF
    A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. This paper describes a way to enforce policies for data confidentiality and integrity in such an environment. Programs annotated with security specifications are statically checked and then transformed by the compiler to run securely on a distributed system with untrusted hosts. The code and data of the computation are partitioned across the available hosts in accordance with the security specification. The key contribution is automatic replication of code and data to increase assurance of integrity—without harming confidentiality, and without placing undue trust in any host. The compiler automatically generates secure run-time protocols for communication among the replicated code partitions. Results are given from a prototype implementation applied to various distributed programs
    • …
    corecore